Categories About Us

Search results for computer

We found 480 results

IT Best Practices: Purchasing a New Computer

Peter goes into the key steps and decisions to make before buying a new computer to make sure you end up with a machine that fits your needs and budget.

OneDrive For Everyday Users

“OneDrive” is a personal cloud-based storage platform provided by Microsoft that is connected to your Windows 10 computer.

Windows 8.1

To use a symphonic orchestra as metaphor for a computer, one could say that the musicians and their instruments symbolizes the computer hardware, the nodeleaflets with music on symbolizes the computer

Excel 365 Basics

EXCEL 365 BASICS: CALCULATING ON THE COMPUTER bAsIC ACtIons92 BASIC ACTIONS2.1 INTRODUCTIONCalculating is one of the most powerful and widely used applications on the computer.

Cyberattacks and Cybersecurity

or financial gain or harm• Computer‐related fraud or forgery• Computer‐related identity offenses• Computer‐related copyright or trademark offenses• Sending or controlling sending of spam• Computer‐related

Excel 2019 Basics

EXCEL 2019 BASICS: CALCULATING ON THE COMPUTER bAsIC ACtIons92 BASIC ACTIONS2.1 INTRODUCTIONCalculating is one of the most powerful and widely used applications on the computer.

In Focus: How Children Learn Through Play

Thought it was really interesting what you said earlier aboutlearning from the computer games that your Children are playing andthe way that they're learning, sharing and collaboration.

IT Governance Controls - Book 2

Control Type 1.3.: Radiation Prevention ControlsComputer equipment and the wiring and computer rooms themselves should be shielded to contain the radiation emanated by computers in order to avoid some

AI Essentials

A computer follows to solve a problem.Like a recipefor baking a cake.Machine learningA form of AIwhere a computer learns from data withoutbeing explicitly programmed for each step.

Data Protection Specialized Controls

Computer equipment, the wiring and computer rooms themselves should be shielded to contain the radiation emanated by computers in order to avoid some external party from picking up all the critical communications